Media
 |
DICOM: The hidden risks of legacy protocols - Threat Talks Cybersecurity Podcast
Source: Threat Talks
|
|
|
show link
Source: David Šetek - Hackni svou budoucnost
|
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
• Unsolicited content • Malicious code • Obtaining information • Intrusion attempt • Penetration • Unavailability • Risk of information security more...
is a system of measures aimed at the protection of classified facts during their creation, receipt, registration, transport, storage, reproduction, elimination and storag... more...
show all
 Interesting
|
22 |
 Recomendations
|
377 |
Establish contact persons and reporting procedures.
Source: it.portal
Evaluate and implement minimum security standards.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Nariadenie Európskeho parlamentu a Rady (EÚ) 2025/37 z 19. decembra 2024, ktorým sa mení nariadenie (EÚ) 2019/881, pokiaľ ide o riadené bezpečnostné služby (Text s význam... more...
show link
Source: Eur-Lex
ZÁKON ze dne 15. září 2021, kterým se mění zákon č. 127/2005 Sb., o elektronických komunikacích a o změně některých souvisejících zákonů (zákon o elektronických komunikac... more...
show link
Source: e-sbirka
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|